Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- european union 2 Treffer
- military relations 2 Treffer
- private security services 2 Treffer
- security sector 2 Treffer
- agreement 1 Treffer
-
44 weitere Werte:
- al qaeda 1 Treffer
- armed forces 1 Treffer
- authority 1 Treffer
- balkans 1 Treffer
- border control 1 Treffer
- border management 1 Treffer
- border security 1 Treffer
- conflict 1 Treffer
- coordination 1 Treffer
- coordination (human services) 1 Treffer
- counter-insurgency 1 Treffer
- counterterrorism 1 Treffer
- diplomacy 1 Treffer
- environmental protection 1 Treffer
- eu acquis 1 Treffer
- european integration 1 Treffer
- european union membership 1 Treffer
- executive 1 Treffer
- globalization 1 Treffer
- government 1 Treffer
- heartland 1 Treffer
- information 1 Treffer
- insurgency 1 Treffer
- international relations 1 Treffer
- legislature 1 Treffer
- management 1 Treffer
- management of security systems 1 Treffer
- national security 1 Treffer
- nongovernmental organizations 1 Treffer
- organizational structure 1 Treffer
- policy 1 Treffer
- political map 1 Treffer
- president 1 Treffer
- private security 1 Treffer
- public administration 1 Treffer
- qaida (organization) 1 Treffer
- responsibility 1 Treffer
- rimland 1 Treffer
- security 1 Treffer
- standards 1 Treffer
- system 1 Treffer
- talent management 1 Treffer
- terrorism 1 Treffer
- tourism management 1 Treffer
Geographischer Bezug
Inhaltsanbieter
7 Treffer
-
In: Security Dialogues, Jg. 5 (2014), Heft 1, S. 45-63academicJournalZugriff:
-
In: Security Dialogues, Jg. 5 (2014), Heft 1, S. 79-98academicJournalZugriff:
-
In: Security Dialogues, Jg. 4 (2013-02-01), Heft 1, S. 151-169academicJournalZugriff:
-
In: Security Dialogues, Jg. 4 (2013-02-01), Heft 1, S. 123-150academicJournalZugriff:
-
In: Security Dialogues, Jg. 4 (2013-02-01), Heft 1, S. 93-106academicJournalZugriff:
-
In: Security Dialogues, Jg. 3 (2012-06-01), Heft 2, S. 87-103academicJournalZugriff:
-
In: Security Dialogues, Jg. 3 (2012-06-01), Heft 2, S. 121-135academicJournalZugriff: